Type: User
Company: EurAsia Technology CO., LTD.
Bio: Bespoke reverse engineering related to hardware and software. Knows electronics, VHDL, Verilog, assembler, C, Java, Python, etc. Vetted in skunkworks projects.
Location: Bangkok
modrobert's Projects
BLAKE2b reference implementation
CRC-16 Generator polynomial G(x) = x¹⁶ + x¹² + x⁵ + 1
CRC-7 Generator polynomial G(x) = x⁷ + x³ + 1
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
Calculate NTLM hash for given string.
Read data from PMS7003 particle sensor and calculate AQI.
Check if given integer is a prime using the GNU MP library.
Generate or check for prime numbers in x86-64 (AMD64) assembler with C wrapper.
This VHDL design for the Spartan-3 FPGA creates a custom pulse which can be used to glitch various hardware.
A python utility to read the contents of a PAC Closed Caption (subtitle) file
bitcoin wallet importer/exporter
This is an implementation of IBM's Quantum Experience in simulation; a 5-qubit quantum computer with a limited set of gates. Please cite me if you end up using this academically.
unix-like reverse engineering framework and commandline tools
Regression Tests for the Radare2 Reverse Engineer's Debugger
Reading the RDRAND x86-64 instruction.
Three ways of reading the RDTSC instruction.
An open letter in support of Richard Matthew Stallman being reinstated by the Free Software Foundation
Simple AWS S3 request tool.
Decrypt AES cipher using keys and data from offsets within files.
SecureChatAnywhere encrypts/decrypts chat messages with AES-128/CBC.
Tetris game implementation in C++.
The TF328 CD32 Ram + IDE Board
Copy input files to given output files using pthreads.
Example C program to set soft open files limit (ulimit).